what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ruxconCFP2005.txt

ruxconCFP2005.txt
Posted Mar 24, 2005
Authored by ruxcon

RUXCON would like to announce the call for papers for the third annual RUXCON conference. Breaking from the RUXCON tradition of having the conference in winter months, this year the conference will be ran during the 1st and 2nd of October. As with previous years, RUXCON will be held at the University of Technology, Sydney, Australia. The dead line for submissions is the 31st of August.

tags | paper, conference
SHA-256 | e03576f7c21d5e7b8539b1b7d2776da5be19c966a6d4bc87a9d2612aabc9202c

ruxconCFP2005.txt

Change Mirror Download
Call For Papers

RUXCON would like to announce the call for papers for the third annual RUXCON
conference.

Breaking from the RUXCON tradition of having the conference in winter months,
this year the conference will be ran during the 1st and 2nd of October.

As with previous years, RUXCON will be held at the University of Technology,
Sydney, Australia.

The dead line for submissions is the 31st of August.


What is RUXCON?

RUXCON is a conference organised by and for the computer security
community. It is an attempt to bring together the individual talents
of the security community through live presentations, activities and
demonstrations.

The conference is held over two days in a relaxed atmosphere, allowing
attendees to enjoy themselves whilst expanding their knowledge of
security.

Live presentations, activities and workshops will cover a full range of
defensive and offensive security topics, varying from unpublished
research to required reading for the public security community.


Presentation Information

Presentations are set to run for 50 minutes, and will be of a formal
nature, with slides and a speech.

Workshops are slightly shorter, between 30-40 minutes in length in a
less formal format, more of a general or introductory skill level.


Presentation Submissions

RUXCON would like to invite people who are interested in security to
submit a presentation or workshop.

Topics of interest include, but are not limited to:

* Code analysis
* Exploitation techniques
* Network scanning and analysis
* Cryptography
* Malware Analysis
* Reverse engineering
* Forensics and Anti-forensics
* Social engineering
* Web application security
* Legal aspects of computer security and surrounding issues
* Law enforcement activities
* Telecommunications security (mobile, GSM, fraud issues, etc.)

Submissions should thoroughly outline your desired presentation or
workshop subject. Accompanying your submission should be the slides
you intend to use or a detailed paper explaining your subject.

If you have any enquiries about submissions, or would like to make a
submission, please send an e-mail to presentations ruxcon org au. The
deadline for submissions is the 31st of August.

If approved we will additionally require:

* A brief personal biography (between 2-5 paragraphs in length),
including: skill set, experience, and credentials.
* A description on your presentation or workshop (between 2-5
paragraphs in length).

Selection Criteria

Presentation selection will be based on technical merit. Presentations
discussion new, previously undisclosed, defensive or offensive security
related material will receive first priority.

Contact Details

Presentation Submissions: presentations ruxcon org au
General Enquiries: ruxcon ruxcon org au

Login or Register to add favorites

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    46 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close